An image encryption scheme with a pseudorandom permutation based on chaotic maps JW Yoon, H Kim Communications in Nonlinear Science and Numerical Simulation 15 (12), 3998-4006, 2010 | 203 | 2010 |
Cityride: a predictive bike sharing journey advisor JW Yoon, F Pinelli, F Calabrese 2012 IEEE 13th international conference on mobile data management, 306-311, 2012 | 155 | 2012 |
Nanopipette delivery of individual molecules to cellular compartments for single-molecule fluorescence tracking A Bruckbauer, P James, D Zhou, JW Yoon, D Excell, Y Korchev, R Jones, ... Biophysical journal 93 (9), 3120-3131, 2007 | 133 | 2007 |
Predicting arrival times of buses using real-time GPS measurements M Sinn, JW Yoon, F Calabrese, E Bouillet 2012 15th International IEEE Conference on Intelligent Transportation …, 2012 | 79 | 2012 |
Hybrid spam filtering for mobile communication JW Yoon, H Kim, JH Huh computers & security 29 (4), 446-459, 2010 | 77 | 2010 |
DySCo: quantitating associations of membrane proteins using two-color single-molecule tracking PD Dunne, RA Fernandes, J McColl, JW Yoon, JR James, SJ Davis, ... Biophysical Journal 97 (4), L5-L7, 2009 | 73 | 2009 |
Bayesian inference for improved single molecule fluorescence tracking JW Yoon, A Bruckbauer, WJ Fitzgerald, D Klenerman Biophysical journal 94 (12), 4932-4947, 2008 | 59 | 2008 |
Estimation of arrival times at transit stops EP Bouillet, F Calabrese, F Pinelli, M Sinn, JW Yoon US Patent 9,183,741, 2015 | 56 | 2015 |
Deterministic and statistical methods for reconstructing multidimensional NMR spectra JW Yoon, S Godsill, E Kupče, R Freeman Magnetic Resonance in Chemistry 44 (3), 197-209, 2006 | 54 | 2006 |
Adaptive classification for brain computer interface systems using sequential Monte Carlo sampling JW Yoon, SJ Roberts, M Dyson, JQ Gan Neural Networks 22 (9), 1286-1294, 2009 | 47 | 2009 |
A new countermeasure against brute-force attacks that use high performance computers for big data analysis HJ Jo, JW Yoon International Journal of Distributed Sensor Networks 11 (6), 406915, 2015 | 28 | 2015 |
Visual honey encryption: Application to steganography JW Yoon, H Kim, HJ Jo, H Lee, K Lee Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia …, 2015 | 27 | 2015 |
Efficient model selection for probabilistic K nearest neighbour classification JW Yoon, N Friel Neurocomputing 149, 1098-1108, 2015 | 26 | 2015 |
Network analysis of temporal trends in scholarly research productivity H Kim, JW Yoon, J Crowcroft Journal of Informetrics 6 (1), 97-110, 2012 | 22 | 2012 |
The impact of COVID-19 on cryptocurrency markets: A network analysis based on mutual information MY Hong, JW Yoon Plos one 17 (2), e0259869, 2022 | 21 | 2022 |
Various threat models to circumvent air-gapped systems for preventing network attack E Lee, H Kim, JW Yoon Information Security Applications: 16th International Workshop, WISA 2015 …, 2016 | 21 | 2016 |
Voice presentation attack detection through text-converted voice command analysis IY Kwak, JH Huh, ST Han, I Kim, J Yoon Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems …, 2019 | 20 | 2019 |
ResMax: Detecting voice spoofing attacks with residual network and max feature map IY Kwak, S Kwag, J Lee, JH Huh, CH Lee, Y Jeon, J Hwang, JW Yoon 2020 25th International Conference on Pattern Recognition (ICPR), 4837-4844, 2021 | 19 | 2021 |
Classification of home appliance by using Probabilistic KNN with sensor data SJ Kang, JW Yoon 2016 Asia-Pacific Signal and Information Processing Association Annual …, 2016 | 18 | 2016 |
Honey chatting: A novel instant messaging system robust to eavesdropping over communication JI Kim, JW Yoon 2016 IEEE International Conference on Acoustics, Speech and Signal …, 2016 | 17 | 2016 |